{"id":"MGASA-2021-0066","summary":"Updated thunderbird packages fix security vulnerabilities","details":"Cross-origin information leakage via redirected PDF requests. (CVE-2021-23953)\n\nType confusion when using logical assignment operators in JavaScript switch\nstatements. (CVE-2021-23954)\n\nIMAP Response Injection when using STARTTLS. (CVE-2020-15685)\n\nHTTPS pages could have been intercepted by a registered service worker when\nthey should not have been. (CVE-2020-26976)\n\nUse-after-poison for incorrectly redeclared JavaScript variables during GC.\n(CVE-2021-23960)\n\nMemory safety bugs fixed in Thunderbird 78.7. (CVE-2021-23964).\n","modified":"2026-04-16T04:42:49.115008452Z","published":"2021-02-04T13:40:24Z","upstream":["CVE-2020-15685","CVE-2020-26976","CVE-2021-23953","CVE-2021-23954","CVE-2021-23960","CVE-2021-23964"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2021-0066.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=28247"},{"type":"ADVISORY","url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-05/"},{"type":"WEB","url":"https://www.thunderbird.net/en-US/thunderbird/78.7.0/releasenotes/"}],"affected":[{"package":{"name":"thunderbird","ecosystem":"Mageia:7","purl":"pkg:rpm/mageia/thunderbird?arch=source&distro=mageia-7"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"78.7.0-1.mga7"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2021-0066.json"}},{"package":{"name":"thunderbird-l10n","ecosystem":"Mageia:7","purl":"pkg:rpm/mageia/thunderbird-l10n?arch=source&distro=mageia-7"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"78.7.0-1.mga7"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2021-0066.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}